Elevator performs the first fully static whole-program binary translation from x86-64 to AArch64 without heuristics by exhaustively considering all byte interpretations and composing reusable code tiles.
hub
Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability
15 Pith papers cite this work. Polarity classification is still indexing.
hub tools
years
2026 15verdicts
UNVERDICTED 15representative citing papers
Cerisier is the first mechanized program logic for modular reasoning about trusted, untrusted, and attested code in capability machines, with a universal contract for untrusted code and demonstrations on secure computation and mutual attestation.
BEACON is a newly released 430 GB multimodal dataset capturing over 100 hours of Valorant gameplay from 28 players to support behavioral biometrics and continuous authentication research.
A low-stake adversary can degrade a liquid staking pool's performance via consensus manipulation and profit from the resulting drop in its LST value through application-layer financial positions.
A sound and complete deductive system for relative trace equality based on relative bisimulation is introduced, formalized in Rocq, and demonstrated on two contract satisfaction proofs.
PoisonCap uses a new poison capability format to deliver strict use-after-free and initialization safety for CHERI systems with no fundamental overhead over Cornucopia baselines.
Pomegranate compartmentalizes commodity OS kernels via virtualization extensions, sentry functions, and EPT-enforced policies, achieving negligible overhead on a Linux network stack when compartment boundaries limit cross-talk.
DeFi vault risk is decomposed into three levels with six on-chain mechanical features generating new loss channels, yielding five aggregated credit risk metrics and an on-chain estimation architecture.
An encoding of Solidity contracts and first-order Hennessy-Milner logic into Lustre enables Kind 2 model checking of complex temporal properties in smart contracts.
ARuleCon uses AI agents plus execution-based checks to convert SIEM rules across vendors with 15% higher fidelity than standard LLM translation.
Ledger-state stigmergy maps biological indirect coordination to blockchain ledgers via a state-transition formalism and three base patterns for on-chain agent coordination.
A longitudinal study of 46 CS students finds that configuring and using mTLS client certificates is difficult even for technical users, with only 9% understanding the security implications.
A conceptual zonal architecture for Wi-Fi-focused cyber ranges with an open-source prototype implementing scenario generation and instantiation.
A literature survey synthesizes 119 studies on AI-driven alert screening into a four-stage taxonomy of filtering, triage, correlation, and generative augmentation while identifying gaps in deployment realism and robustness.
Differentially private synthetic data and seeded agent-based models can separate personal identities from usable financial data while meeting regulatory privacy rules.
citing papers explorer
-
Deterministic Fully-Static Whole-Binary Translation without Heuristics
Elevator performs the first fully static whole-program binary translation from x86-64 to AArch64 without heuristics by exhaustively considering all byte interpretations and composing reusable code tiles.
-
Cerisier: A Program Logic for Attestation in a Capability Machine
Cerisier is the first mechanized program logic for modular reasoning about trusted, untrusted, and attested code in capability machines, with a universal contract for untrusted code and demonstrations on secure computation and mutual attestation.
-
BEACON: A Multimodal Dataset for Learning Behavioral Fingerprints from Gameplay Data
BEACON is a newly released 430 GB multimodal dataset capturing over 100 hours of Valorant gameplay from 28 players to support behavioral biometrics and continuous authentication research.
-
Your Loss is My Gain: Low Stake Attacks on Liquid Staking Pools
A low-stake adversary can degrade a liquid staking pool's performance via consensus manipulation and profit from the resulting drop in its LST value through application-layer financial positions.
-
A Deductive System for Contract Satisfaction Proofs
A sound and complete deductive system for relative trace equality based on relative bisimulation is introduced, formalized in Rocq, and demonstrated on two contract satisfaction proofs.
-
PoisonCap: Efficient Hierarchical Temporal Safety for CHERI
PoisonCap uses a new poison capability format to deliver strict use-after-free and initialization safety for CHERI systems with no fundamental overhead over Cornucopia baselines.
-
Pomegranate: A Lightweight Compartmentalization Architecture using Virtualization Extensions
Pomegranate compartmentalizes commodity OS kernels via virtualization extensions, sentry functions, and EPT-enforced policies, achieving negligible overhead on a Linux network stack when compartment boundaries limit cross-talk.
-
Vault as a credit instrument
DeFi vault risk is decomposed into three levels with six on-chain mechanical features generating new loss channels, yielding five aggregated credit risk metrics and an on-chain estimation architecture.
-
KindHML: formal verification of smart contracts based on Hennessy-Milner logic
An encoding of Solidity contracts and first-order Hennessy-Milner logic into Lustre enables Kind 2 model checking of complex temporal properties in smart contracts.
-
ARuleCon: Agentic Security Rule Conversion
ARuleCon uses AI agents plus execution-based checks to convert SIEM rules across vendors with 15% higher fidelity than standard LLM translation.
-
Ledger-State Stigmergy: A Formal Framework for Indirect Coordination Grounded in Distributed Ledger State
Ledger-state stigmergy maps biological indirect coordination to blockchain ledgers via a state-transition formalism and three base patterns for on-chain agent coordination.
-
Understanding Student Experiences with TLS Client Authentication
A longitudinal study of 46 CS students finds that configuring and using mTLS client certificates is difficult even for technical users, with only 9% understanding the security implications.
-
From Conceptual Scaffold to Prototype: A Standardized Zonal Architecture for Wi-Fi Security Training
A conceptual zonal architecture for Wi-Fi-focused cyber ranges with an open-source prototype implementing scenario generation and instantiation.
-
AI-Driven Security Alert Screening and Alert Fatigue Mitigation in Security Operations Centers: A Comprehensive Survey
A literature survey synthesizes 119 studies on AI-driven alert screening into a four-stage taxonomy of filtering, triage, correlation, and generative augmentation while identifying gaps in deployment realism and robustness.
-
Decoupling Identity from Utility: Privacy-by-Design Frameworks for Financial Ecosystems
Differentially private synthetic data and seeded agent-based models can separate personal identities from usable financial data while meeting regulatory privacy rules.